Exam 26: Data Breaches
Exam 1: The Importance of MIS80 Questions
Exam 2: Business Processes, information Systems, and Information89 Questions
Exam 3: Organizational Strategy, information Systems, and Competitive Advantage96 Questions
Exam 4: Hardware and Software80 Questions
Exam 5: Database Processing80 Questions
Exam 6: The Cloud74 Questions
Exam 7: Organizations and Information Systems84 Questions
Exam 8: Social Media Information Systems91 Questions
Exam 9: Business Intelligence Systems92 Questions
Exam 10: Information Systems Security93 Questions
Exam 11: Information Systems Management80 Questions
Exam 12: Information Systems Development80 Questions
Exam 13: Collaboration Information Systems for Decision Making problem Solving and Project Management46 Questions
Exam 14: Collaborative Information Systems for Student Projects53 Questions
Exam 15: Mobile Systems50 Questions
Exam 16: Introduction to Microsoft Excel 201348 Questions
Exam 17: Database Design44 Questions
Exam 18: Using Microsoft Access 201348 Questions
Exam 19: Using Excel and Access Together50 Questions
Exam 20: Network and Cloud Technology62 Questions
Exam 21: Enterprise Resource Planning ERP Systems50 Questions
Exam 22: Supply Chain Management40 Questions
Exam 23: Enterprise Social Networks and Knowledge Management40 Questions
Exam 24: Database Marketing40 Questions
Exam 25: Reporting Systems and OLAP44 Questions
Exam 26: Data Breaches50 Questions
Exam 27: International Mis41 Questions
Exam 28: Systems Development Project Management44 Questions
Exam 29: Agile Development44 Questions
Exam 30: Business Process Management40 Questions
Select questions type
Which of the following should be done by employees to protect against data breaches?
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
D
Decisions on how to respond to a data breach are most effective if they are made when the breach is happening.
Free
(True/False)
4.8/5
(36)
Correct Answer:
False
________ are software or procedures used to prevent an information security attack.
Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
B
Which of the following regulatory laws requires data protection for financial institutions?
(Multiple Choice)
4.8/5
(29)
Stolen credit card information is validated through a process called carding.
(True/False)
4.9/5
(32)
The purpose of a business continuity planning session in an organization is to ________.
(Multiple Choice)
4.9/5
(34)
Which of the following is true of the measures to be taken by an organization in the event of a data breach?
(Multiple Choice)
4.8/5
(27)
It is easier for organizations to prepare a list of countermeasures against many different types of attacks and take appropriate measures accordingly.
(True/False)
5.0/5
(36)
A group of hackers use a targeted phishing attack to breach a company's firewalls and hack into its security system.Which of the following techniques have the hackers used?
(Multiple Choice)
4.9/5
(37)
Explain the basic countermeasures to be taken by organizations to protect themselves against data breaches.
(Essay)
4.8/5
(28)
Venclave Hospital is a privately-owned organization that specializes in treating neurological diseases.Which of the following regulatory laws governs the data security measures to be taken by this hospital for protecting against data breach?
(Multiple Choice)
4.8/5
(31)
A(n)________ is said to happen when an unauthorized person views,alters,or steals secured data.
(Multiple Choice)
4.9/5
(27)
The Federal Information Security Management Act (FISMA)details the procedures to be followed by a federal agency in case an organization fails to ensure the minimum security requirements for its data and systems.
(True/False)
4.9/5
(35)
________ refers to the process of placing a small charge on a credit card to ensure it is working.
(Multiple Choice)
4.7/5
(20)
An organization can easily stop a simple SQL injection attack on its online store by additional user training,stronger vendor authentication,or an internal network intrusion detection system.
(True/False)
4.8/5
(30)
Data extrusion helps organizations secure their data from possible data breaches.
(True/False)
4.8/5
(30)
Personally identifiable information includes a person's bank account numbers,personal identification numbers,email address,and social security numbers.
(True/False)
4.9/5
(33)
List some of the regulatory laws that govern the secure storage of data in certain industries.
(Essay)
4.8/5
(29)
Spear phishing is used by organizations to monitor traffic passing through their internal network.
(True/False)
4.8/5
(36)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)